Posts Categorised: Cybersecurity

“The 2016 Cyber Maturity report is the culmination of 12 months’ research by the ASPI International Cyber Policy Centre. The report assesses the approach of 23 regional countries to the challenges and opportunities that cyberspace presents, in terms of their governance structure, legislation, law enforcement, military, business and social engagement with cyber policy and security issues.”

“This report provides an accessible and critical appraisal of the government’s implementation of the strategy over the past 12 months. It addresses each of the strategy’s five themes, highlighting achievements and areas of weakness; evaluates issues of execution; and suggests ways to evolve the delivery and initiatives of the strategy to achieve its objectives.”

“Sharing information on the cyber landscape is a necessary and efficient way to benefit from mutual exposure to cyber threats and boost collective defensive capacity. The US has been pursuing cyber information sharing since the late 1990s, when the federal government directed the creation of public–private partnerships for critical infrastructure protection. The now decades-long development of a variety of information sharing models in the US provide case studies and lessons for the Australian cybersecurity community as it pursues deeper information sharing mechanisms.”

“This white paper by Europol, Middlesex University and UCD Geary Institute for Public Policy… draws together existing, recent evidence on online behaviour and associations with criminal and antisocial behaviour amongst young people. Specifically, it was designed to explore the trajectories and pathways that lead to ‘cyber-criminality’ through a series of mixed-methodological endeavours and the integration of theoretical frameworks across criminology and psychology, including cyberpsychology and computer science.”

“The ACSC Threat Report 2016 continues to reflect the experience, focus, and mandates of the ACSC’s member organisations. This report provides an insight into what the centre has been seeing, learning, and responding to, focusing on specific areas of change or new knowledge obtained.”

Source: Australian Cyber Security Centre and available from this link (open access).

“Today’s advanced attacks focus more on exploiting human flaws than system flaws. To explore this under-reported aspect of enterprise threats, we created The Human Factor. This paper presents original ﬁeld research using data gathered by Proofpoint products deployed in customer settings around the world. It covers the latest trends in in email attachments, social media posts, and URLs. The Human Factor reveals not just who is clicking what, but how threat actors are exploiting the human factor. Because as the data makes clear, the weakest link in security is all of us.”

“Australia’s Cyber Security Strategy sets out the federal government’s philosophy and program for meeting the dual challenges of the digital age—advancing and protecting our interests online. A secure cyberspace provides trust and confidence for individuals, business and the public sector to share ideas and information and to innovate online.”

Source: Australia. Dept. of Prime Minister and Cabinet and available from this link (open access).

“The 2016 report identifies eight trends that reflect macro forces fuelling innovation: digital, analytics, cloud, the renaissance of core systems, and the changing role of IT within the enterprise, balanced with the implications of cyber risk—security, compliance, regulatory and compliance, quality, and safety.”